Need Help? We are right here!
Thanks for your Enquiry. Our team will soon reach out to you.
If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com
Search Results:
×miniOrange Identity Broker service solution enables cross protocol authentication. You can configure SimpleSAML as an IDP for Single Sign-On (SSO) into your applications/websites. Here, SimpleSAML will act as an Identity Provider (IDP) and miniOrange will act as a broker.
We offer a pre-built solution for integrating with SimpleSAML, making it easier and quick to implement. Our team can also help you set up SimpleSAML as SAML IDP to login into your applications.
miniOrange offers free help through a consultation call with our System Engineers to configure SSO for different apps using SimpleSAML as IDP in your environment with 30-day free trial.
For this, you need to just send us an email at idpsupport@xecurify.com to book a slot and we'll help you in no time.
miniOrange provides user authentication from various external sources, which can be Directories (like ADFS, Microsoft Active Directory, OpenLDAP, AWS etc), Identity Providers (like Microsoft Entra ID, Okta, AWS), and many more. You can configure your existing directory/user store or add users in miniOrange.






| IDP Entity ID | Identity Provider Issuer from SimpleSAML |
| SAML SSO Login URL | Identity Provider Single Sign-On URL from SimpleSAML |
| X.509 Certificate | X.509 Certificate from SimpleSAML |
| Single Logout URL [Optional] | Single Logout URL from SimpleSAML |

| Domain Mapping | Can be used to redirect specific domain user to specific IDP |
| Show IdP to Users | Enable this if you want to show this IDP to all users during Login |
| Send Configured Attributes | Enabling this would allow you to add attributes to be sent from IDP |

$metadata['__DYNAMIC:1__'] = [
'host' => '__DEFAULT__',
/* X.509 key and certificate. Relative to the cert directory.*/
'privatekey' => '<YOUR_PRIVATE_KEY_FILE_NAME>', //eg. RSA_Private_Key.pem
'certificate' => '<YOUR_PUBLIC_KEY_FILE_NAME>', //eg. RSA_Public_Key.cer
/* Authentication source to use. Configured in 'config/authsources.php'. */
'auth' => '<YOUR_AUTH_SOURCE_NAME>'
];$metadata['https://example.com/miniorange-saml-20-single-sign-on/'] = [
'AssertionConsumerService' => 'https://example.com/',
'SingleLogoutService' => 'https://example.com/',
'NameIDFormat' => 'urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress',
'simplesaml.nameidattribute' => 'mail',
'simplesaml.attributes' => true,
'attributes' => array('mail', 'givenname', 'sn', 'memberOf'),
];
You have successfully configured SimpleSAML as SAML IdP (Identity Provider) for achieving SimpleSAML SSO login.


You can follow this guide, if you want to configure SAML/WS-FED, OAuth/OIDC, JWT, Radius etc

Maps information, such as email and username, during Just-In-Time (JIT) user creation. Email and Username attributes are necessary to create the user profile.

EXTERNAL mappings help alter incoming attribute names before sending them to apps, ensuring that the data is in the correct format.

You can follow this guide, if you want to configure multiple IDPs (Identity Providers) and give users the option to select the IDP of their choice to authenticate with.